US9582304B2 - Remote management of virtual machines hosted in a private network - Google Patents

Remote management of virtual machines hosted in a private network Download PDF

Info

Publication number
US9582304B2
US9582304B2 US14/501,301 US201414501301A US9582304B2 US 9582304 B2 US9582304 B2 US 9582304B2 US 201414501301 A US201414501301 A US 201414501301A US 9582304 B2 US9582304 B2 US 9582304B2
Authority
US
United States
Prior art keywords
virtual machine
client application
private network
host
management commands
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US14/501,301
Other versions
US20150135180A1 (en
Inventor
George Runcie
Derek Rodrigues
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kaseya Ltd
Datto LLC
Original Assignee
Kaseya International Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US14/501,301 priority Critical patent/US9582304B2/en
Application filed by Kaseya International Ltd filed Critical Kaseya International Ltd
Assigned to KASEYA LIMITED reassignment KASEYA LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: Kaseya International Limited
Publication of US20150135180A1 publication Critical patent/US20150135180A1/en
Priority to US15/438,574 priority patent/US9921863B2/en
Publication of US9582304B2 publication Critical patent/US9582304B2/en
Application granted granted Critical
Assigned to WELLS FARGO BANK, NATIONAL ASSOCIATION, AS AGENT reassignment WELLS FARGO BANK, NATIONAL ASSOCIATION, AS AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KASEYA LIMITED
Priority to US15/926,332 priority patent/US10417028B2/en
Assigned to FABSTONE INVESTMENTS LLC reassignment FABSTONE INVESTMENTS LLC SUBORDINATED SECOND LIEN US PATENT SECURITY AGREEMENT Assignors: KASEYA LIMITED, RAPIDFIRE TOOLS INC., SPANNING CLOUD APPS LLC, UNITRENDS, INC.
Assigned to KASEYA LIMITED reassignment KASEYA LIMITED RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: WELLS FARGO BANK, NATIONAL ASSOCIATION
Assigned to KASEYA LUXEMBOURG HOLDINGS S.C.A. reassignment KASEYA LUXEMBOURG HOLDINGS S.C.A. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: VEEAM SOFTWARE LIMITED
Assigned to DATTO, LLC reassignment DATTO, LLC CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: DATTO, INC.
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks

Definitions

  • This invention relates to virtual machines existing on a private network and to the remote management of the network via a virtual network host.
  • Virtual machines are configured on virtual machine hosts, of which Microsoft Virtual Server, VMWare Server, VMWare ESX Server, are commercially available examples.
  • the virtual machine host is protected within a private network by a firewall which prevents external communications from remote machines outside of the network. It is therefore difficult to remotely manage the private network from outside of the network.
  • a method for managing one or more virtual machines in a private network comprises generating at least one virtual machine management command in a server application, communicating the at least one virtual machine management command from the server application to a client application within the private network, redirecting the at least one virtual machine management command from the client application to a virtual machine host of the private network, and executing the at least one virtual machine management command in the virtual machine host.
  • a system comprising a virtual machine host that resides within a private network, a client application that resides on a machine within the private network, a server application that resides on a machine remote from the private network, a communication channel from the server application to the client application for providing one or more management commands from the server application to the client application, and a redirection channel for redirecting the one or more management commands from the client application to the virtual network host.
  • a computer-readable medium comprising computer-executable instructions for execution by a processor, that, when executed, cause a processor to provide an interface on a remote machine to receive one or more virtual machine management commands in a host independent format, receive one or more virtual machine management commands through the interface, and communicate the one or more virtual machine management commands in a host independent format to a client application within a network.
  • FIG. 1 illustrates a system for remotely managing virtual machines of a private network
  • FIG. 2 illustrates a method for remotely managing virtual machines of a private network
  • FIG. 3 illustrates a processor and memory of a remote machine that executes a server application
  • FIG. 4 illustrates an instruction set that may be executed on the processor and memory of FIG. 3 ;
  • FIG. 5 illustrates the processor and memory of FIG. 3 in association with a processor and memory of a network machine that executes a client application.
  • a private network 13 includes a virtual machine host 16 such as a vendor specific virtual machine server, of which Microsoft Virtual Server, VMWare Server, VMWare ESX Server, are commercially available examples.
  • the private network 13 may include any number of additional physical machines (not shown) that execute any number of applications.
  • the private network 13 may interact with a public wide area network 15 such as the internet. Protection of the private network may be provided by a firewall 17 as is known.
  • a server application 12 is provided on a machine remote or external to the private network 13 .
  • the server application may be provided as a web application with a suitable interface allowing the user 11 to enter network management commands and parameters.
  • a web application may be provided from a web server (not shown) within the virtual network 13 .
  • the term remote as used herein describes that the server application is not typically configured on a machine within the machines of the private network 13 .
  • a machine on which the server application executes to receive management commands may be remote to the network by not being configured as a machine of the private network, irrespective of any geographic location of the remote machine.
  • Management commands may include reconfiguring virtual machine settings, e.g. drives, memory, hard disk space allocations, etc. Management commands may also include reading changed machine settings, updating power states (e.g. stopping, starting, suspending), etc.
  • the server application 12 may be configured to receive management commands from the user 11 in a format independent of any virtual machine host vendor. In one embodiment, the management commands may be entered via a web based form, though a person skilled in the art will readily recognize other ways in which these parameters may be entered.
  • the virtual machine host 16 is typically provided with a firewall 17 which prevents direct communication with the virtual machine host 16 from outside of the network 13 .
  • the virtual network 13 includes a client application 14 which provides a communication channel 19 between the server application 12 via the outside network 15 on one end and between the virtual machine host 16 on the other end.
  • a method for managing one or more virtual machines in the private network 13 is illustrated in the flowchart 100 of FIG. 2 .
  • a user provides one or more virtual machine management commands.
  • the management commands are received by the server application and communicated to the client application 14 through the network 15 (step 102 ).
  • the client application 14 redirects the management commands to the virtual machine host 16 (step 103 ) which then executes the management commands accordingly (step 104 ).
  • the client application may reside on any machine within the virtual network 13 including the virtual machine host 16 itself. However, the client application 14 is configured with a communication channel that allows it to communicate with outside machines through any network firewalls 17 .
  • the virtual machine management commands are specified independent of the virtual machine vendor. Therefore, the user need not be aware of the virtual machine platform vendor.
  • the management commands are communicated in a vendor independent format over the network and are only transformed into a vendor specific definition at the point of direct interaction with the virtual machine host 16 .
  • the virtual machine management operations (start, stop, pause, etc.) are agnostic with respect to the virtual machine host platform.
  • the end-user need not know or care that a particular virtual machine is hosted by VMware ESX, Microsoft Virtual Server, etc. It is only once the management operations are executed on the host system by the client, that the generic operations are translated (by the client) into vendor specific operations.
  • the server application 12 downloads the client side management utilities which support an application command line interface and an event messaging interface. Utilities are downloaded to their corresponding hosts.
  • the server application 12 will supports different virtualization platforms by providing their corresponding set of management utilities.
  • the command and messaging interface allows the server application 12 to use a single engine to manage any virtualization platforms without specialization requirements.
  • MS Windows virtualization platforms host a light preconfigured virtual machine to provide a minimum execution environment for the downloaded utilities. This eliminates the requirement for special platform support development.
  • VMWare ESX server runs on a derived Linux OS. Having a light virtual machine running MS Windows in ESX servers can eliminate porting requirements.
  • MS Virtual Server 2005 does not provide extensive snapshot features that VMWare ESX or MS Hyper-V support.
  • ESX & Hyper-V provide historical snapshots whereas VS2k5 only provides a single time snapshot which means there is only one snapshot that can be restored at anytime.
  • the server's VS2k5 utility will provide a mechanism to save away the VS2k5 snapshots when the snapshot command is executed from the server.
  • the utility will create its own storage archive in the host machine to put away each snapshot while cataloging snapshot properties for later retrievals.
  • VMWare platforms do not provide virtual machine desktop thumbnails on their virtualization management platforms.
  • MS tools not only show the vms' desktop thumbnails, but also provide APIs to retrieve them.
  • the server web management interface will provide desktop thumbnails for all virtualization platforms.
  • the virtual machine management commands may include a specification of which virtual machine host a virtual machine is resident on.
  • the components of the systems 10 may be embodied in hardware, software, firmware or a combination of hardware, software and/or firmware.
  • the server application 12 may be executed on a device, such as a computer, etc including a processor 61 operatively associated with a memory 62 as shown in FIG. 3 .
  • the memory 62 may store instructions that are executable on the processor 61 .
  • An instruction set 200 that may be executed on the processor 61 is depicted in the flowchart of FIG. 3 . Specifically, when executed, the instruction set 200 allows the processor to provide the server application through an interface (step 201 ), which allows the user to enter virtual machine management commands.
  • the management commands are recorded by the processor 61 (step 202 ) and communicated to the client application (step 203 ) in a host independent format.
  • the processor 61 may communicate through a suitable communications link 65 with further processors, such as a processor 71 of a machine within the network 13 with associated memory 72 .
  • the processor 61 may provide the virtual machine management commands.
  • the processor 71 may execute the client application in order to receive the virtual machine management commands and transform the host independent management commands into a host specific definition, thereby allowing the virtual machine host to execute the management commands for the relevant virtual machine.
  • the information sent between various modules can be sent between the modules via at least one of a data network, the Internet, an Internet Protocol network, a wireless source, and a wired source and via plurality of protocols.

Abstract

Management of virtual machines within a private network may be provided from a server application, such as a web application, on a machine remote from a private network. The server application receives management commands and communications the management commands in a vendor independent format to a client application within the private network. The client application receives the management commands, instantiates the management commands into a vendor specific definition and redirects the management commands to the virtual machine host for appropriate execution.

Description

CROSS-REFERENCE TO RELATED APPLICATION
The instant application is a continuation of and claims priority from patent application Ser. No. 13/855,948, filed Apr. 3, 2013, entitled REMOTE MANAGEMENT OF VIRTUAL MACHINES HOSTED IN A PRIVATE NETWORK, now issued U.S. Pat. No. 8,849,906, issued on Sep. 30, 2014, which is a continuation of application Ser. No. 12/469,171, filed May 20, 2009, entitled REMOTE MANAGEMENT OF VIRTUAL MACHINES HOSTED IN A PRIVATE NETWORK, now issued U.S. Pat. No. 8,438,216, issued on May 7, 2013, the entire contents of each are incorporated by reference herein.
FIELD OF THE INVENTION
This invention relates to virtual machines existing on a private network and to the remote management of the network via a virtual network host.
BACKGROUND OF THE INVENTION
Virtual machines are configured on virtual machine hosts, of which Microsoft Virtual Server, VMWare Server, VMWare ESX Server, are commercially available examples. Typically, the virtual machine host is protected within a private network by a firewall which prevents external communications from remote machines outside of the network. It is therefore difficult to remotely manage the private network from outside of the network.
What is required is a system, method and computer readable medium for remotely managing virtual machines within a private network.
SUMMARY OF THE INVENTION
In one aspect of the disclosure, there is provided a method for managing one or more virtual machines in a private network. The method comprises generating at least one virtual machine management command in a server application, communicating the at least one virtual machine management command from the server application to a client application within the private network, redirecting the at least one virtual machine management command from the client application to a virtual machine host of the private network, and executing the at least one virtual machine management command in the virtual machine host.
In one aspect of the disclosure, there is provided a system comprising a virtual machine host that resides within a private network, a client application that resides on a machine within the private network, a server application that resides on a machine remote from the private network, a communication channel from the server application to the client application for providing one or more management commands from the server application to the client application, and a redirection channel for redirecting the one or more management commands from the client application to the virtual network host.
In one aspect of the disclosure, there is provided a computer-readable medium comprising computer-executable instructions for execution by a processor, that, when executed, cause a processor to provide an interface on a remote machine to receive one or more virtual machine management commands in a host independent format, receive one or more virtual machine management commands through the interface, and communicate the one or more virtual machine management commands in a host independent format to a client application within a network.
BRIEF DESCRIPTION OF THE DRAWINGS
Reference will now be made, by way of example only, to specific embodiments and to the accompanying drawings in which:
FIG. 1 illustrates a system for remotely managing virtual machines of a private network;
FIG. 2 illustrates a method for remotely managing virtual machines of a private network;
FIG. 3 illustrates a processor and memory of a remote machine that executes a server application;
FIG. 4 illustrates an instruction set that may be executed on the processor and memory of FIG. 3; and
FIG. 5 illustrates the processor and memory of FIG. 3 in association with a processor and memory of a network machine that executes a client application.
DETAILED DESCRIPTION OF THE INVENTION
In FIG. 1, there is shown a system 10 in accordance with an embodiment of the disclosure. In the system 10, a private network 13 includes a virtual machine host 16 such as a vendor specific virtual machine server, of which Microsoft Virtual Server, VMWare Server, VMWare ESX Server, are commercially available examples. The private network 13 may include any number of additional physical machines (not shown) that execute any number of applications. The private network 13 may interact with a public wide area network 15 such as the internet. Protection of the private network may be provided by a firewall 17 as is known.
A server application 12 is provided on a machine remote or external to the private network 13. The server application may be provided as a web application with a suitable interface allowing the user 11 to enter network management commands and parameters. A web application may be provided from a web server (not shown) within the virtual network 13. The term remote as used herein describes that the server application is not typically configured on a machine within the machines of the private network 13. A machine on which the server application executes to receive management commands may be remote to the network by not being configured as a machine of the private network, irrespective of any geographic location of the remote machine.
Management commands may include reconfiguring virtual machine settings, e.g. drives, memory, hard disk space allocations, etc. Management commands may also include reading changed machine settings, updating power states (e.g. stopping, starting, suspending), etc. The server application 12 may be configured to receive management commands from the user 11 in a format independent of any virtual machine host vendor. In one embodiment, the management commands may be entered via a web based form, though a person skilled in the art will readily recognize other ways in which these parameters may be entered.
As described above, the virtual machine host 16 is typically provided with a firewall 17 which prevents direct communication with the virtual machine host 16 from outside of the network 13. In accordance with an embodiment of the disclosure, the virtual network 13 includes a client application 14 which provides a communication channel 19 between the server application 12 via the outside network 15 on one end and between the virtual machine host 16 on the other end.
A method for managing one or more virtual machines in the private network 13 is illustrated in the flowchart 100 of FIG. 2. At step 101, a user provides one or more virtual machine management commands. The management commands are received by the server application and communicated to the client application 14 through the network 15 (step 102). The client application 14 redirects the management commands to the virtual machine host 16 (step 103) which then executes the management commands accordingly (step 104).
The client application may reside on any machine within the virtual network 13 including the virtual machine host 16 itself. However, the client application 14 is configured with a communication channel that allows it to communicate with outside machines through any network firewalls 17.
The virtual machine management commands are specified independent of the virtual machine vendor. Therefore, the user need not be aware of the virtual machine platform vendor. The management commands are communicated in a vendor independent format over the network and are only transformed into a vendor specific definition at the point of direct interaction with the virtual machine host 16. The virtual machine management operations (start, stop, pause, etc.) are agnostic with respect to the virtual machine host platform. When initiating these management operations from the remote server, the end-user need not know or care that a particular virtual machine is hosted by VMware ESX, Microsoft Virtual Server, etc. It is only once the management operations are executed on the host system by the client, that the generic operations are translated (by the client) into vendor specific operations.
The server application 12 downloads the client side management utilities which support an application command line interface and an event messaging interface. Utilities are downloaded to their corresponding hosts. The server application 12 will supports different virtualization platforms by providing their corresponding set of management utilities. The command and messaging interface allows the server application 12 to use a single engine to manage any virtualization platforms without specialization requirements.
In one specific example, MS Windows virtualization platforms host a light preconfigured virtual machine to provide a minimum execution environment for the downloaded utilities. This eliminates the requirement for special platform support development. For example, VMWare ESX server runs on a derived Linux OS. Having a light virtual machine running MS Windows in ESX servers can eliminate porting requirements.
Normalizing the features of the server application 12 to the highest common denominator across different virtualization platforms will require some utilities to encapsulate extra functionalities than others. For example, MS Virtual Server 2005 does not provide extensive snapshot features that VMWare ESX or MS Hyper-V support. ESX & Hyper-V provide historical snapshots whereas VS2k5 only provides a single time snapshot which means there is only one snapshot that can be restored at anytime. To enhance VS2k5 snapshot functionality, the server's VS2k5 utility will provide a mechanism to save away the VS2k5 snapshots when the snapshot command is executed from the server. The utility will create its own storage archive in the host machine to put away each snapshot while cataloging snapshot properties for later retrievals. In another example, VMWare platforms do not provide virtual machine desktop thumbnails on their virtualization management platforms. MS tools not only show the vms' desktop thumbnails, but also provide APIs to retrieve them. The server web management interface will provide desktop thumbnails for all virtualization platforms.
In a network having multiple virtual machine hosts 16, the virtual machine management commands may include a specification of which virtual machine host a virtual machine is resident on.
The components of the systems 10 may be embodied in hardware, software, firmware or a combination of hardware, software and/or firmware. In a hardware embodiment, the server application 12 may be executed on a device, such as a computer, etc including a processor 61 operatively associated with a memory 62 as shown in FIG. 3. The memory 62 may store instructions that are executable on the processor 61. An instruction set 200 that may be executed on the processor 61 is depicted in the flowchart of FIG. 3. Specifically, when executed, the instruction set 200 allows the processor to provide the server application through an interface (step 201), which allows the user to enter virtual machine management commands. The management commands are recorded by the processor 61 (step 202) and communicated to the client application (step 203) in a host independent format.
As shown in FIG. 5, the processor 61 may communicate through a suitable communications link 65 with further processors, such as a processor 71 of a machine within the network 13 with associated memory 72. Through the communications link 65, the processor 61 may provide the virtual machine management commands. The processor 71 may execute the client application in order to receive the virtual machine management commands and transform the host independent management commands into a host specific definition, thereby allowing the virtual machine host to execute the management commands for the relevant virtual machine.
Although embodiments of the present invention have been illustrated in the accompanied drawings and described in the foregoing description, it will be understood that the invention is not limited to the embodiments disclosed, but is capable of numerous rearrangements, modifications, and substitutions without departing from the spirit of the invention as set forth and defined by the following claims. For example, the capabilities of the invention can be performed fully and/or partially by one or more of the blocks, modules, processors or memories. Also, these capabilities may be performed in the current manner or in a distributed manner and on, or via, any device able to provide and/or receive information. Further, although depicted in a particular manner, various modules or blocks may be repositioned without departing from the scope of the current invention. Still further, although depicted in a particular manner, a greater or lesser number of modules and connections can be utilized with the present invention in order to accomplish the present invention, to provide additional known features to the present invention, and/or to make the present invention more efficient. Also, the information sent between various modules can be sent between the modules via at least one of a data network, the Internet, an Internet Protocol network, a wireless source, and a wired source and via plurality of protocols.

Claims (20)

What is claimed is:
1. A method, comprising:
communicating at least one virtual machine management command to a client application within a private network, wherein the client application is configured with a communication channel permitting communication with machines external to the private network;
redirecting the at least one virtual machine management command from the client application to a virtual machine host of the private network; and
executing the at least one virtual machine management command in the virtual machine host.
2. The method according to claim 1 wherein the client application provides an entry point into the private network.
3. The method according to claim 1 comprising executing the client application from the virtual machine host.
4. The method according to claim 1 comprising generating the at least one virtual machine management command in a server application, wherein the server application resides in a machine remote from the private network.
5. The method according to claim 4 comprising configuring the client application to provide a communication channel between the server application and the client application.
6. The method according to claim 4 comprising communicating the at least one management command from the server application to the client application in a vendor independent configuration.
7. The method according to claim 1 wherein the client application instantiates the at least one management command into a vendor specific virtual machine host format.
8. The method according to claim 4 comprising providing the server application as a web application.
9. A system, comprising:
a virtual machine host, including a processor and memory, resides within a private network;
a client application that resides on a machine within the private network;
wherein the client application receives one or more management commands, via a communication channel from a machine external to the private network, wherein the communication channel permits communication between the client application that resides on the machine within the private network and the machine external to the private network; and
a redirection channel that redirects the one or more management commands from the client application to the virtual machine host.
10. The system according to claim 9 wherein the client application is executed on a machine within the private network.
11. The system according to claim 9 wherein the client application is executed on the virtual machine host.
12. The system according to claim 9 wherein the communication channel comprises a firewall.
13. The system according to claim 9 comprising a server application that resides on the machine external to the private network, wherein the server application is configured to communicate the one or more management commands to the client application in a vendor independent format.
14. The system according to claim 12 wherein the client application is configured to instantiate the one or more management commands into a vendor specific definition.
15. The system according to claim 13 wherein the server application is configured to download one or more client side management utilities.
16. The system according to claim 9 wherein the client application supports a pre-configured virtual machine that provides a minimum execution environment.
17. A non-transitory computer-readable storage medium comprising computer-executable instructions for execution by a processor, that, when executed, cause a processor to:
receive one or more virtual machine management commands in a host independent format through an interface on a remote machine; and
communicate the one or more virtual machine management commands in a host independent format to a client application within a private network, wherein the client application is configured with a communication channel that permits communication with machines external to the private network.
18. The non-transitory computer readable storage medium according to claim 17 comprising instructions that cause the processor to perform at least one of: execute the client application that receives the one or more virtual machine management commands and redirect the one or more virtual machine management commands to a virtual machine host.
19. The non-transitory computer readable storage medium according to claim 18 wherein the client application is configured to perform at least one of:
determine a virtual machine host from the one or more virtual machine management commands; and
convert the one or more virtual machine management commands into a host dependent format.
20. The non-transitory computer readable storage medium according to claim 18 comprising instructions that cause the virtual machine host to execute the one or more virtual machine management commands.
US14/501,301 2009-05-20 2014-09-30 Remote management of virtual machines hosted in a private network Active 2029-12-06 US9582304B2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US14/501,301 US9582304B2 (en) 2009-05-20 2014-09-30 Remote management of virtual machines hosted in a private network
US15/438,574 US9921863B2 (en) 2009-05-20 2017-02-21 Remote management of virtual machines hosted in a private network
US15/926,332 US10417028B2 (en) 2009-05-20 2018-03-20 Remote management of virtual machines hosted in a private network

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12/469,171 US8438216B2 (en) 2009-05-20 2009-05-20 Remote management of virtual machines hosted in a private network
US13/855,948 US8849906B2 (en) 2009-05-20 2013-04-03 Remote management of virtual machines hosted in a private network
US14/501,301 US9582304B2 (en) 2009-05-20 2014-09-30 Remote management of virtual machines hosted in a private network

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/855,948 Continuation US8849906B2 (en) 2009-05-20 2013-04-03 Remote management of virtual machines hosted in a private network

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/438,574 Continuation US9921863B2 (en) 2009-05-20 2017-02-21 Remote management of virtual machines hosted in a private network

Publications (2)

Publication Number Publication Date
US20150135180A1 US20150135180A1 (en) 2015-05-14
US9582304B2 true US9582304B2 (en) 2017-02-28

Family

ID=43125291

Family Applications (5)

Application Number Title Priority Date Filing Date
US12/469,171 Active 2030-04-05 US8438216B2 (en) 2009-05-20 2009-05-20 Remote management of virtual machines hosted in a private network
US13/855,948 Active US8849906B2 (en) 2009-05-20 2013-04-03 Remote management of virtual machines hosted in a private network
US14/501,301 Active 2029-12-06 US9582304B2 (en) 2009-05-20 2014-09-30 Remote management of virtual machines hosted in a private network
US15/438,574 Active 2029-06-05 US9921863B2 (en) 2009-05-20 2017-02-21 Remote management of virtual machines hosted in a private network
US15/926,332 Active 2029-05-26 US10417028B2 (en) 2009-05-20 2018-03-20 Remote management of virtual machines hosted in a private network

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US12/469,171 Active 2030-04-05 US8438216B2 (en) 2009-05-20 2009-05-20 Remote management of virtual machines hosted in a private network
US13/855,948 Active US8849906B2 (en) 2009-05-20 2013-04-03 Remote management of virtual machines hosted in a private network

Family Applications After (2)

Application Number Title Priority Date Filing Date
US15/438,574 Active 2029-06-05 US9921863B2 (en) 2009-05-20 2017-02-21 Remote management of virtual machines hosted in a private network
US15/926,332 Active 2029-05-26 US10417028B2 (en) 2009-05-20 2018-03-20 Remote management of virtual machines hosted in a private network

Country Status (1)

Country Link
US (5) US8438216B2 (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9633089B1 (en) * 2002-05-25 2017-04-25 hopTo Inc. Aggregated search
US8819113B2 (en) * 2009-03-02 2014-08-26 Kaseya International Limited Remote provisioning of virtual machines
US9015709B2 (en) 2011-03-08 2015-04-21 Rackspace Us, Inc. Hypervisor-agnostic method of configuring a virtual machine
KR101692733B1 (en) * 2012-01-30 2017-01-04 엘지전자 주식회사 Method for managing virtual machine and device therefor
US9027024B2 (en) 2012-05-09 2015-05-05 Rackspace Us, Inc. Market-based virtual machine allocation
US9729493B1 (en) * 2012-06-25 2017-08-08 Vmware, Inc. Communicating messages over a social network to members of a virtualization infrastructure
US9929998B1 (en) 2012-08-24 2018-03-27 Vmware, Inc. Tagged messages to facilitate administration of a virtualization infrastructure
US9189758B2 (en) 2012-06-25 2015-11-17 Vmware, Inc. Administration of a network
US9923859B1 (en) 2013-06-25 2018-03-20 Vmware, Inc. Creating a group of members based on monitoring a social network
TWI588751B (en) 2013-05-31 2017-06-21 聯想企業解決方案(新加坡)有限公司 Computer host with a baseboard management controller to manage virtual machines and method thereof
US9887951B2 (en) 2013-06-25 2018-02-06 Vmware, Inc. Graphing relative health of virtualization servers
WO2016137512A1 (en) * 2015-02-27 2016-09-01 Hewlett Packard Enterprise Development Lp Cloud network management
US10171630B2 (en) 2016-08-26 2019-01-01 Amazon Technologies, Inc. Executing remote commands
US20190334778A1 (en) * 2016-11-30 2019-10-31 Nutanix, Inc. Generic access to heterogeneous virtualized entities
KR102485368B1 (en) 2018-01-15 2023-01-05 삼성전자주식회사 Electronic apparatus, method for controlling thereof and the computer readable recording medium
US10901781B2 (en) 2018-09-13 2021-01-26 Cisco Technology, Inc. System and method for migrating a live stateful container
CN110377393A (en) * 2019-06-26 2019-10-25 苏州浪潮智能科技有限公司 A kind of implementation method, device and the storage medium of virtual management platform

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7278157B2 (en) * 2002-03-14 2007-10-02 International Business Machines Corporation Efficient transmission of IP data using multichannel SOCKS server proxy
US20080178278A1 (en) * 2007-01-22 2008-07-24 Doron Grinstein Providing A Generic Gateway For Accessing Protected Resources
US20090144393A1 (en) * 2007-11-29 2009-06-04 Yutaka Kudo Method and apparatus for locating candidate data centers for application migration
US20100138830A1 (en) * 2008-05-02 2010-06-03 Skytap Multitenant hosted virtual machine infrastructure
US20100217843A1 (en) * 2009-02-26 2010-08-26 Dehaan Michael Paul Systems and methods for collecting and altering firmware configurations of target machines in a software provisioning environment
US7840673B1 (en) * 2002-06-17 2010-11-23 International Business Machines Corporation Method and apparatus for management of hosted applications
US8230050B1 (en) * 2008-12-10 2012-07-24 Amazon Technologies, Inc. Providing access to configurable private computer networks

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6874020B1 (en) * 2000-08-28 2005-03-29 International Business Machines Corporation System uses application manager and master agent to communicate with mini-agents for remotely managing application resources distributed across multiple Java virtual machines
US8776050B2 (en) * 2003-08-20 2014-07-08 Oracle International Corporation Distributed virtual machine monitor for managing multiple virtual resources across multiple physical nodes
US7689987B2 (en) * 2004-06-30 2010-03-30 Microsoft Corporation Systems and methods for stack-jumping between a virtual machine and a host environment
US8015563B2 (en) * 2006-04-14 2011-09-06 Microsoft Corporation Managing virtual machines with system-wide policies
US9392078B2 (en) * 2006-06-23 2016-07-12 Microsoft Technology Licensing, Llc Remote network access via virtual machine
US8458695B2 (en) * 2006-10-17 2013-06-04 Manageiq, Inc. Automatic optimization for virtual systems
US8856782B2 (en) * 2007-03-01 2014-10-07 George Mason Research Foundation, Inc. On-demand disposable virtual work system
EP2132629A1 (en) * 2007-04-05 2009-12-16 Sentillion, Inc. Augmenting a virtual machine hosting environment from within a virtual machine
US9304819B2 (en) * 2007-05-29 2016-04-05 Red Hat, Inc. Virtual deployment
US8307443B2 (en) * 2007-09-28 2012-11-06 Microsoft Corporation Securing anti-virus software with virtualization
US8671404B2 (en) * 2008-02-12 2014-03-11 Red Hat, Inc. Distributing and managing virtual machines
US8365167B2 (en) * 2008-04-15 2013-01-29 International Business Machines Corporation Provisioning storage-optimized virtual machines within a virtual desktop environment
US7921197B2 (en) * 2008-11-19 2011-04-05 Vmware, Inc. Dynamic configuration of virtual machines
US8719365B1 (en) * 2009-02-12 2014-05-06 Adobe Systems Incorporated Graphic output from remote execution of applications redirected with dynamically sized virtual screen

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7278157B2 (en) * 2002-03-14 2007-10-02 International Business Machines Corporation Efficient transmission of IP data using multichannel SOCKS server proxy
US7840673B1 (en) * 2002-06-17 2010-11-23 International Business Machines Corporation Method and apparatus for management of hosted applications
US20080178278A1 (en) * 2007-01-22 2008-07-24 Doron Grinstein Providing A Generic Gateway For Accessing Protected Resources
US20090144393A1 (en) * 2007-11-29 2009-06-04 Yutaka Kudo Method and apparatus for locating candidate data centers for application migration
US20100138830A1 (en) * 2008-05-02 2010-06-03 Skytap Multitenant hosted virtual machine infrastructure
US8230050B1 (en) * 2008-12-10 2012-07-24 Amazon Technologies, Inc. Providing access to configurable private computer networks
US20100217843A1 (en) * 2009-02-26 2010-08-26 Dehaan Michael Paul Systems and methods for collecting and altering firmware configurations of target machines in a software provisioning environment

Also Published As

Publication number Publication date
US8849906B2 (en) 2014-09-30
US20150135180A1 (en) 2015-05-14
US20170161087A1 (en) 2017-06-08
US10417028B2 (en) 2019-09-17
US20100299387A1 (en) 2010-11-25
US20180210746A1 (en) 2018-07-26
US20130227570A1 (en) 2013-08-29
US9921863B2 (en) 2018-03-20
US8438216B2 (en) 2013-05-07

Similar Documents

Publication Publication Date Title
US10417028B2 (en) Remote management of virtual machines hosted in a private network
US8819113B2 (en) Remote provisioning of virtual machines
US10205750B2 (en) Policy-based secure web boot
CN106201566B (en) Benefit wins the hot upgrade method of big special software and equipment
US9003001B2 (en) Bios parameter virtualization via BIOS configuration profiles
EP3851959A1 (en) Method and apparatus for migrating virtual machine
US9400671B2 (en) Computer host with a baseboard management controller to manage virtual machines
EP2891977B1 (en) Method, system and device for managing software on virtual machine in cloud environment
US9721102B2 (en) Boot mechanisms for bring your own management
US20190179646A1 (en) Remote Provisioning of Hosts in Public Clouds
US20170329739A1 (en) Methods and systems for loading a boot agent on a router network device
BR112019019654A2 (en) methods and systems for providing on-demand activation access to session servers
GB2519517A (en) Managing virtual appliances supporting multiple profiles
US9928082B1 (en) Methods and systems for remote device configuration
JP6195465B2 (en) Remote card content management using synchronous server-side scripting
CN108234174B (en) Management method and device of virtual network function
US10261921B2 (en) Universal secure platform virtualization system and method thereof
US10986185B1 (en) Managing functionality of multiple devices via a delta proxy
EP4018629B1 (en) Desktop virtualization with a dedicated cellular network connection for client devices
US20190243674A1 (en) System and method for entity management
TWI799035B (en) System updating method and electronic apparatus
US20230353630A1 (en) Establishing a communication channel between computing nodes with different operating systems
TW201523285A (en) System and method for downloading GuestOS
Lewis et al. Application Virtualizaton as a Strategy for Cyber Foraging in Resource-Constrained Environments
CN102455904A (en) Diskless client employing system management program

Legal Events

Date Code Title Description
AS Assignment

Owner name: KASEYA LIMITED, IRELAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KASEYA INTERNATIONAL LIMITED;REEL/FRAME:033880/0921

Effective date: 20140917

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS AGENT, MASSACHUSETTS

Free format text: SECURITY INTEREST;ASSIGNOR:KASEYA LIMITED;REEL/FRAME:042589/0410

Effective date: 20170526

Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS AGENT,

Free format text: SECURITY INTEREST;ASSIGNOR:KASEYA LIMITED;REEL/FRAME:042589/0410

Effective date: 20170526

AS Assignment

Owner name: FABSTONE INVESTMENTS LLC, OHIO

Free format text: SUBORDINATED SECOND LIEN US PATENT SECURITY AGREEMENT;ASSIGNORS:SPANNING CLOUD APPS LLC;UNITRENDS, INC.;KASEYA LIMITED;AND OTHERS;REEL/FRAME:046286/0755

Effective date: 20180517

AS Assignment

Owner name: KASEYA LUXEMBOURG HOLDINGS S.C.A., NEW YORK

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:VEEAM SOFTWARE LIMITED;REEL/FRAME:049122/0138

Effective date: 20190503

Owner name: KASEYA LIMITED, NEW YORK

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:049122/0181

Effective date: 20190503

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 4

AS Assignment

Owner name: DATTO, LLC, CONNECTICUT

Free format text: CHANGE OF NAME;ASSIGNOR:DATTO, INC.;REEL/FRAME:065385/0256

Effective date: 20230804